generated from ossf/project-template
-
Notifications
You must be signed in to change notification settings - Fork 41
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Amended scenario codename to SOSS Community Day, added templates and …
…readme to reflect scenario Signed-off-by: Ian-Barbour <[email protected]>
- Loading branch information
1 parent
72bd824
commit 91d57f7
Showing
40 changed files
with
653 additions
and
835 deletions.
There are no files selected for viewing
12 changes: 0 additions & 12 deletions
12
docs/TTX/Andromeda_Gales/Event_Logs/10_Env_Enumeration.log
This file was deleted.
Oops, something went wrong.
12 changes: 0 additions & 12 deletions
12
docs/TTX/Andromeda_Gales/Event_Logs/11_Establish_Comms.log
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
26 changes: 0 additions & 26 deletions
26
docs/TTX/Andromeda_Gales/Event_Logs/15_Network_Boundary_Bridging_VPCFlow.log
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
26 changes: 0 additions & 26 deletions
26
docs/TTX/Andromeda_Gales/Event_Logs/24_Transmission_to_External_C2_Server_VPCFlow.log
This file was deleted.
Oops, something went wrong.
10 changes: 0 additions & 10 deletions
10
docs/TTX/Andromeda_Gales/Event_Logs/2_Artifactory_Sync.log
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
13 changes: 0 additions & 13 deletions
13
docs/TTX/Andromeda_Gales/Event_Logs/5_Build_Persistence.log
This file was deleted.
Oops, something went wrong.
11 changes: 0 additions & 11 deletions
11
docs/TTX/Andromeda_Gales/Event_Logs/6_Artifactory_Prod_Image.log
This file was deleted.
Oops, something went wrong.
10 changes: 0 additions & 10 deletions
10
docs/TTX/Andromeda_Gales/Event_Logs/7_Discovery_Check_Against_Security_Software_Prisma.log
This file was deleted.
Oops, something went wrong.
11 changes: 0 additions & 11 deletions
11
docs/TTX/Andromeda_Gales/Event_Logs/8_Env_Keying_Prisma.log
This file was deleted.
Oops, something went wrong.
11 changes: 0 additions & 11 deletions
11
docs/TTX/Andromeda_Gales/Event_Logs/9_Persistence_Jobs_Prisma.log
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
44 changes: 22 additions & 22 deletions
44
...it_Log_for_Encoded_Command_Execution.yaml → ...it_Log_for_Encoded_Command_Execution.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,23 +1,23 @@ | ||
kind: Event | ||
apiVersion: audit.k8s.io/v1 | ||
level: RequestResponse | ||
timestamp: "2024-02-29T21:00:00Z" | ||
auditID: a1b2c3d4-e5f6-g7h8-i9j0-k1l2m3n4o5p6 | ||
stage: ResponseComplete | ||
requestURI: "/api/v1/namespaces/default/pods/andromeda-web-app-container/exec" | ||
verb: create | ||
user: | ||
username: system:serviceaccount:default:andromeda-service-account | ||
uid: "123456" | ||
groups: | ||
- system:serviceaccounts | ||
- system:serviceaccounts:default | ||
- system:authenticated | ||
sourceIPs: ["192.0.2.123"] | ||
responseObject: | ||
status: "Success" | ||
reason: "Executed Encoded Command" | ||
annotations: | ||
kubernetes.io/encoded-command: "[Redacted for Security]" | ||
authorization.k8s.io/decision: "allow" | ||
kind: Event | ||
apiVersion: audit.k8s.io/v1 | ||
level: RequestResponse | ||
timestamp: "2024-02-29T21:00:00Z" | ||
auditID: a1b2c3d4-e5f6-g7h8-i9j0-k1l2m3n4o5p6 | ||
stage: ResponseComplete | ||
requestURI: "/api/v1/namespaces/default/pods/andromeda-web-app-container/exec" | ||
verb: create | ||
user: | ||
username: system:serviceaccount:default:andromeda-service-account | ||
uid: "123456" | ||
groups: | ||
- system:serviceaccounts | ||
- system:serviceaccounts:default | ||
- system:authenticated | ||
sourceIPs: ["192.0.2.123"] | ||
responseObject: | ||
status: "Success" | ||
reason: "Executed Encoded Command" | ||
annotations: | ||
kubernetes.io/encoded-command: "[Redacted for Security]" | ||
authorization.k8s.io/decision: "allow" | ||
authorization.k8s.io/reason: "RBAC: allowed by RoleBinding andromeda-rb/default to ServiceAccount andromeda-service-account" |
44 changes: 22 additions & 22 deletions
44
...4_C2_Traffic_Masquerading_CloudWatch.json → ...4_C2_Traffic_Masquerading_CloudWatch.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,23 +1,23 @@ | ||
{ | ||
"timestamp": "2024-02-29T21:05:00Z", | ||
"logStream": "AndromedaWebCluster/andromeda-web-app-container", | ||
"message": "Outbound connection attempt to masqueraded C2 hostname detected. Hostname matches internal service, but DNS resolution history is suspicious. Protocol pattern mimics legitimate service traffic, indicating potential obfuscation efforts.", | ||
"kubernetes": { | ||
"cluster": "AndromedaWebCluster", | ||
"namespace": "default", | ||
"pod": "andromeda-web-app-container", | ||
"container": "andromeda-web-app" | ||
}, | ||
"network": { | ||
"destinationHostname": "internal-service.companydomain.com", | ||
"resolvedIP": "malicious[.]ip[.]address", | ||
"protocol": "HTTPS", | ||
"action": "OutboundConnectionAttempt", | ||
"outcome": "Success" | ||
}, | ||
"threat": { | ||
"indicator": "C2TrafficMasquerading", | ||
"level": "High", | ||
"response": "AlertGenerated" | ||
} | ||
{ | ||
"timestamp": "2024-02-29T21:05:00Z", | ||
"logStream": "AndromedaWebCluster/andromeda-web-app-container", | ||
"message": "Outbound connection attempt to masqueraded C2 hostname detected. Hostname matches internal service, but DNS resolution history is suspicious. Protocol pattern mimics legitimate service traffic, indicating potential obfuscation efforts.", | ||
"kubernetes": { | ||
"cluster": "AndromedaWebCluster", | ||
"namespace": "default", | ||
"pod": "andromeda-web-app-container", | ||
"container": "andromeda-web-app" | ||
}, | ||
"network": { | ||
"destinationHostname": "internal-service.companydomain.com", | ||
"resolvedIP": "malicious[.]ip[.]address", | ||
"protocol": "HTTPS", | ||
"action": "OutboundConnectionAttempt", | ||
"outcome": "Success" | ||
}, | ||
"threat": { | ||
"indicator": "C2TrafficMasquerading", | ||
"level": "High", | ||
"response": "AlertGenerated" | ||
} | ||
} |
34 changes: 17 additions & 17 deletions
34
...Logs/15_Network_Boundary_Bridging_K8.yaml → ...Logs/15_Network_Boundary_Bridging_K8.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,18 +1,18 @@ | ||
kind: Event | ||
apiVersion: audit.k8s.io/v1 | ||
level: RequestResponse | ||
timestamp: "2024-02-29T22:30:00Z" | ||
auditID: d7e8f9g0-h1i2-j3k4-l5m6-n7o8p9q0r1s2 | ||
stage: ResponseComplete | ||
requestURI: "/apis/networking.k8s.io/v1/namespaces/default/networkpolicies" | ||
verb: "list" | ||
user: | ||
username: "system:serviceaccount:default:andromeda-service-account" | ||
sourceIPs: ["10.244.2.2"] | ||
responseObject: | ||
kind: NetworkPolicyList | ||
apiVersion: networking.k8s.io/v1 | ||
annotations: | ||
kubernetes.io/network-boundary-bridging: "Attempted enumeration of network policies to identify zero-trust boundary weaknesses." | ||
responseStatus: | ||
kind: Event | ||
apiVersion: audit.k8s.io/v1 | ||
level: RequestResponse | ||
timestamp: "2024-02-29T22:30:00Z" | ||
auditID: d7e8f9g0-h1i2-j3k4-l5m6-n7o8p9q0r1s2 | ||
stage: ResponseComplete | ||
requestURI: "/apis/networking.k8s.io/v1/namespaces/default/networkpolicies" | ||
verb: "list" | ||
user: | ||
username: "system:serviceaccount:default:andromeda-service-account" | ||
sourceIPs: ["10.244.2.2"] | ||
responseObject: | ||
kind: NetworkPolicyList | ||
apiVersion: networking.k8s.io/v1 | ||
annotations: | ||
kubernetes.io/network-boundary-bridging: "Attempted enumeration of network policies to identify zero-trust boundary weaknesses." | ||
responseStatus: | ||
code: 200 |
28 changes: 14 additions & 14 deletions
28
...e_Roles_and_Policies_Exploitation_K8.yaml → ...e_Roles_and_Policies_Exploitation_K8.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,15 +1,15 @@ | ||
kind: Event | ||
apiVersion: audit.k8s.io/v1 | ||
level: Metadata | ||
timestamp: "2024-02-29T22:40:00Z" | ||
auditID: u1v2w3x4-y5z6-a7b8-c9d0-e1f2g3h4i5j6 | ||
stage: ResponseComplete | ||
requestURI: "/apis/rbac.authorization.k8s.io/v1/namespaces/default/roles" | ||
verb: "list" | ||
user: | ||
username: "system:serviceaccount:default:andromeda-service-account" | ||
sourceIPs: ["10.244.2.3"] | ||
annotations: | ||
kubernetes.io/role-exploitation: "Listed roles in the default namespace to find overly permissive configurations for privilege escalation." | ||
responseStatus: | ||
kind: Event | ||
apiVersion: audit.k8s.io/v1 | ||
level: Metadata | ||
timestamp: "2024-02-29T22:40:00Z" | ||
auditID: u1v2w3x4-y5z6-a7b8-c9d0-e1f2g3h4i5j6 | ||
stage: ResponseComplete | ||
requestURI: "/apis/rbac.authorization.k8s.io/v1/namespaces/default/roles" | ||
verb: "list" | ||
user: | ||
username: "system:serviceaccount:default:andromeda-service-account" | ||
sourceIPs: ["10.244.2.3"] | ||
annotations: | ||
kubernetes.io/role-exploitation: "Listed roles in the default namespace to find overly permissive configurations for privilege escalation." | ||
responseStatus: | ||
code: 200 |
Oops, something went wrong.